Jump to content

thomisus

Members
  • Posts

    526
  • Joined

Posts posted by thomisus

  1. have look at these questions, if you have any comments please share

     

    An engineer must advertise a selection of external networks learned from a BGP neighbor into the ACI
    fabric. Which L3Out subnet configuration option creates an inbound route map for route filtering?
    A. External Subnets for the External EPG
    B. Shared Route Control Subnet
    C. Import Route Control Subnet
    D. Shared Security Import Subnet

    An engineer must set up a Cisco ACI fabric to send Syslog messages related to hardware events, such as
    chassis line card failures. The messages should be sent to a dedicated Syslog server. Where in the Cisco
    APIC should the policy be configured to meet this requirement?
    A. uni/tn-common/monepg-default
    B. uni/infra/monifra-default
    C. uni/fabric/monfab-default
    D. uni/fabric/moncommon

    An engineer must implement management policy and data plane separation in the Cisco ACI fabric. Which
    ACI object must be created in Cisco APIC to accomplish this goal?
    A. Application profile
    B. Tenant
    C. Contract
    D. Bridge domain

    An engineer wants to monitor all configuration changes, threshold crossing, and link-state transitions in a
    Cisco ACI fabric. Which action must be taken to receive the required messages?
    A. Add Faults and Events to the monitor policy.
    B. Add Session Logs and Audit Logs to the monitor policy.
    C. Include Audit Logs and Events in the Syslog source policy.
    D. Include Events and Session Logs in the Syslog source policy.

    An organization has encountered many STP-related issues in the past due to failed hardware components.
    They are in the process of long-term migration to a newly deployed ACI fabric. Senior engineers are worried
    that spanning-tree loops in the existing network may be extended to the ACI fabric. Which feature must be
    enabled on the ACI leaf ports to protect the fabric from spanning-tree loops?
    A. BPDU Guard
    B. per-VLAN MCP
    C. Storm Control
    D. BPDU Filter

    A network engineer must design a method to allow the Cisco ACI to redirect traffic to the firewalls. Only
    traffic that matches specific L4-L7 policy rules should be redirected. The load must be distributed across
    multiple firewalls to scale the performance horizontally. Which action must be taken to meet these
    requirements?
    A. Configure ACI Service Graph with Unidirectional PBR.
    B. Implement ACI Service Graph with GIPo.
    C. Implement ACI Service Graph Two Nodes with GIPo.
    D. Configure ACI Service Graph with Symmetric PBR.

    An engineer created two interface protocol policies called Pol_CDP40275332 and Pol_LLDP46783451. The
    policies must be used together in a single policy. Which ACI object must be used?
    A. interface policy group
    B. switch policy group
    C. switch profile
    D. interface profile

    A systems engineer is implementing the Cisco ACI fabric. However, the Server2
    information is missing from the Leaf 101 endpoint table and the COOP database of the spine. The
    requirement is for the bridge domain configuration to enforce the ACI fabric to forward the unicast packets
    generated by Server1 destined to Server2. Which action must be taken to meet these requirements?
    A. Enable ARP Flooding
    B. Set L2 Unknown Unicast to Flood
    C. Set IP Data-Plane Learning to No
    D. Enable Unicast Routing

    An engineer must allow multiple external networks to communicate with internal ACI subnets. Which action
    should the engineer take to assign the prefix to the class ID of the external Endpoint Group?
    B9670B295EC4724B7AC7AF37296A4809
    A. Enable the Export Route Control Subnet for the External Endpoint Group flag.
    B. Enable an L3Out with Shared Route Control Subnet.
    C. Configure subnets with the External Subnets for External EPG flag enabled.
    D. Configure subnets with the Import Route Control Subnet flag enabled.

    An engineer must ensure that Cisco ACI flushes the appropriate endpoints when a topology change
    notification message is received in an MST domain. Which three steps are required to accomplish this
    goal? (Choose three.)
    A. Enable the BPDU interface controls under the spanning tree interface policy.
    B. Configure a new STP interface policy.
    C. Bind the spanning tree policy to the switch policy group.
    D. Associate the STP interface policy to the appropriate interface policy group.
    E. Create a new region policy under the spanning tree policy.
    F. Map VLAN range to MAT instance number.

    A Cisco ACI bridge domain and VRF are configured with a default data-plane learning configuration. Which
    two endpoint attributes are programmed in the leaf switch when receiving traffic? (Choose two.)
    A. Remote MAC, IP
    B. Remote Subnet
    C. Local IP, not MAC
    D. Local MAC, IP
    E. Local Subnet
    F. Remote IP

     An engineer wants to initiate an ICMP ping from Server1 to Server2. The requirement
    is for the BD1 to enforce ICMP replies that follow the expected path. The packets must be prevented from
    taking the direct path from Leaf1 to Server1. Which action must be taken on BD1 to meet these
    requirements?
    A. Set L2 Unknown Unicast to Flood.
    B. Set L2 Unknown Unicast to Hardware Proxy.
    C. Disable Unicast Routing.
    D. Enable ARP Flooding.

    An engineer must configure a group of servers with a contract that uses TCP port 80. The EGP that
    contains the web servers requires an external Layer 3 cloud to initiate communication. Which action must
    be taken to meet these requirements?
    A. Configure the EGP as a provider and L3 out as consumer of the contract.
    B. Configure OSPF to exchange routes between the L3 out and EGP.
    C. Configure a taboo contract and apply it to the EPG.
    D. Configure the EPG as a consumer and L3 out as a provider of the contract.

    The unicast routing feature is enabled on the bridge domain. Which two conditions enable the Cisco ACI
    B9670B295EC4724B7AC7AF37296A4809
    leaf to learn a source IP as a local endpoint? (Choose two.)
    A. Through Ethernet traffic received in a bridge domain.
    B. IP traffic routed through an SVI.
    C. Through VXLAN traffic received on the uplink.
    D. IP traffic routed through a Layer 3 Out.
    E. Through ARP received on an SVI.

    When does the Cisco ACI leaf learn a source IP or MAC as a remote endpoint?
    A. When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the Layer 3 Out
    EPG subnet range.
    B. When VXLAN traffic arrives on a leaf fabric port from the spine and outer source IP is in the bridge
    domain subnets range.
    C. When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the Layer 3 Out
    EPG subnet range.
    D. When VXLAN traffic arrives on a leaf fabric port from the spine and inner source IP is in the bridge
    domain subnets range.

    The company ESXi infrastructure is hosted on the Cisco UCS-B Blade Servers. The company decided to
    take advantage of ACI VMM integration to enable consistent enforcement of policies across virtual and
    physical workloads. The requirement is to prevent the packet loss between the distributed virtual switch and
    the ACI fabric. Which setting must be implemented on a vSwitch policy to accomplish this goal?
    A. Static Channel
    B. MAC Pinning
    C. LACP
    D. LLDP

    An engineer is configuring ACI VMM domain integration with Cisco UCS-B Series. Which type of port
    channel policy must be configured in the vSwitch policy?
    A. LACP Active
    B. MAC Pinning
    C. LACP Passive
    D. MAC Pinning-Physical-NIC-load

    In-band is currently configured and used to manage the Cisco ACI fabric. The requirement is for leaf and
    spine switches to use out-of-band management for NTP protocol. Which action accomplishes this goal?
    A. Select Out-of-Band as Management EPG in the default DateTimePolicy.
    B. Create an Override Policy with NTP Out-of-Band for leaf and spine switches.
    C. Change the interface used for APIC external connectivity to ooband.
    D. Add a new filter to the utilized Out-of-Band-Contract to allow NTP protocol.

    An administrator must migrate the vSphere Management VMkernel of all ESXi hosts in the production
    cluster from the standard default virtual switch to a VDS that is integrated with APIC in a VMM domain.
    Which action must be completed in this scenario?
    A. The Management VMkernel EPG resolution must be set to Pre-Provosion.
    B. The administrator must create an in-band VMM Management EPG before performing the migration.
    C. The administrator must set the Management VMkernel BD resolution immediacy to On-Demand.
    D. The VMkernel Management BD must be located under the Management Tenant.

    A customer implements RBAC on a Cisco APIC using a Windows RADIUS server that is configured with
    network control policies. The APIC is as follows:
    Tenant = TenantX
    Security Domain = Tenantx-SD
    User = X
    The customer requires User X to have access to TenantX only, without any extra privilege in the Cisco ACI
    fabric domain. Which Cisco AV pair must be implemented on the RADIUS server to meet these
    requirement?
    A. shell:domains = TenantX-SD/fabric-admin/,common//read-all
    B. shell:domains = TenantX-SD/tenant-admin
    B9670B295EC4724B7AC7AF37296A4809
    C. shell:domains = TenantX-SD/tenant-ext-admin/,common//read-all
    D. shell:domains = TenantX-SD/tenant-admin/,common//read-all

    An engineer must create a backup of the Cisco ACI fabric for disaster recovery purposes. The backup must
    be transferred over a secure and encrypted transport. The backup file must contain all user and password
    related information. The engineer also wants to process and confirm the backup file validity by using a
    Python script. This requires the data structure to have a format similar to a Python dictionary. Which
    configuration set must be used to meet these requirements?
    A. Under the Create Remote location settings, select Protocol: FTP
    Under the Export policy, select
    - Format: XML
    - Modify Global AES Encryption Settings: Enabled
    B. Under the Create Remote location settings, select Protocol: FTP
    Under the Export policy, select
    - Format: XML
    - Modify Global AES Encryption Settings: Disabled
    C. Under the Create Remote location settings, select Protocol: SCP
    Under the Export policy, select
    - Format: JSON
    - Modify Global AES Encryption Settings: Disabled
    D. Under the Create Remote location settings, select Protocol: SCP
    Under the Export policy, select
    - Format: JSON
    - Modify Global AES Encryption Settings: Enabled

    An application team tells the Cisco ACI network administrator that it wants to monitor the statistics of the
    unicast and BUM traffic that are seen in a certain EPG. Which statement describes the collection statistics?
    A. All EPGs in the Cisco ACI tenant object must be enabled for statistics to be collected.
    B. Cisco ACI does not capture statistics at the EPG level. Only statistics that pass through ACI contracts
    can be monitored.
    C. EPG statistics can be collected only for VMM domains. If a physical domain exists, statistics are not
    collected.
    D. The collection of statistics is enabled on the EPG level by enabling the statistics for unicast and BUM
    traffic.

    Which routing protocol is supported between Cisco ACI spines and IPNs in a Cisco ACI Multi-Pod
    environment?
    A. OSPF
    B. IS-IS
    C. BGP
    D. EIGRP

    An engineer must deploy Cisco ACI across 10 geographically separated data centers. Which ACI site
    deployment feature enables the engineer to control which bridge domains contain Layer 2 flooding?
    A. GOLF
    B. Multi-Site
    C. Multi-Pod
    D. Stretched Fabric

     

    • Like 4
  2. 58 minutes ago, Tiger said:

    Hi All,

    I am in search for either CCNP or CCIE Service Provider Official Cisco CertGuide. If there's no latest version released can you be kind enough to share the older one?

    Thanks in advance.

    There were no books directly named as CCNP SP but there are bunch of books related to service provider track. no new ciscopress book has been released lately.

    If you want to follow that track, I recommend you to watch CCNA level SPNGN1&2 courses first.

    • Like 3
  3. On 8/10/2021 at 1:49 AM, NiceGuy said:

    My feeling is that the OP means well; he shares dozens of things every day, but he is not an expert on what he shares. Some of his material is recent/great, others are old junk, he just does not know / screen.

    I am trying to upload at my spare time at work. These are from my archive with old and new materials. Some old materials are really good to follow, some are not. I have downloaded this dump from tutdl and i do not know if it is updated or not. That site states it is actual test latest dumps. As you follow, dumps have been too dynamic even ballistic to follow. I recommend you to follow chinese sites.

     

    As manu times i stated under my shares, i have been banned manu times from mega. And from my working place, torrent or gdrive are not allowed.  I used to use anonfiles in CC before but anonfiles are not available so i prefer zippyshare. It is fast to upload. Besides i recommended to use jdownloader.

    I also wanted help from those good souls who can download materials to upload to mega or so.

    If you warn me about the materials i upload, i will do corrections. 

    Happy learning to you all.

    • Like 1
×
×
  • Create New...